System for dynamic network reconfiguration and quarantine in response to threat conditions

a dynamic network and quarantine technology, applied in the field of data processing system, can solve problems such as mischief or damage, high threat condition, and computer and computer network vulnerability to threats

Inactive Publication Date: 2005-12-15
IBM CORP
View PDF32 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007] The present invention provides a method, apparatus, and computer instructions for responding to a threat condition within the network data processing system. A threat condition within the network data processing system is detected. At least one routing device i

Problems solved by technology

Computers and computer networks are vulnerable to threats.
Each time the spreadsheet program is run, the virus also runs and may spread and cause mischief or damage.
If more systems are infected or if the infection is a particularly virulent form of a worm, the threat condition is considered to be high.
All of these methods are labor intensive and do not affect collections of data processing systems.
Further, these methods do not result in any intellige

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for dynamic network reconfiguration and quarantine in response to threat conditions
  • System for dynamic network reconfiguration and quarantine in response to threat conditions
  • System for dynamic network reconfiguration and quarantine in response to threat conditions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] With reference now to the figures, FIG. 1 depicts a pictorial representation of a network of data processing systems in which the present invention may be implemented. Network data processing system 100 is a network of computers in which the present invention may be implemented. Network data processing system 100 contains a network 102, which is the medium used to provide communications links between various devices and computers connected together within network data processing system 100. Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables. Network 102 also includes routers and switches to facilitate the routing of traffic through network 102.

[0017] In the depicted example, server 104 and server 105 are connected to network 102 along with storage unit 106. In addition, clients 108, 110, and 112 are connected to network 102. These clients 108, 110, and 112 may be, for example, personal computers or network computers. In the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, apparatus, and computer instructions for responding to a threat condition within the network data processing system. A threat condition within the network data processing system is detected. At least one routing device is dynamically reconfigured within the network data processing system to isolate or segregate one or more infected data processing systems within the network data processing system. This dynamic reconfiguration occurs in response to the threat condition being detected.

Description

BACKGROUND OF THE INVENTION [0001] 1. Technical Field [0002] The present invention relates generally to an improved data processing system and in particular to a method and apparatus for processing data. Still more particularly, the present invention relates to a method, apparatus, and computer instructions for responding to threat conditions. [0003] 2. Description of Related Art [0004] Computers and computer networks are vulnerable to threats. These threats include, for example, viruses, worms, and Trojan horses. A virus is a small piece of software that may piggyback itself on a real program. For example, a virus may attach itself to a spreadsheet program. Each time the spreadsheet program is run, the virus also runs and may spread and cause mischief or damage. A worm is a small piece of software that exploits computer networks and security holes to replicate itself and spread. A Trojan horse is a computer program that may claim to perform one function, but performs another, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06
CPCH04L63/145
Inventor GUPTA, PRATIKLINDQUIST, DAVID BRUCE
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products